Conversations on china hacking

In 2009 and again in 2010, researchers from Information Warfare Monitor (is public-private venture between two Canadian institutions: the Citizen
Lab at the Munk School of Global Affairs, University of Toronto and The
SecDev Group, an operational think tank based in a Ottawa, Canada. It is an independent research activity
tracking the emergence of cyberspace as a strategic domain.

In 2009 the researchers released the report Tracking GhostNet: Investigating a Cyber Espionage Network. In 2010 the researchers released Shadows in the Cloud: Investigating Cyber Espionage 2.0. In both of these reports it was revealed that hackers from China hacked into Indian computers and picked sensitive information. The Shadow Report, reported that there
have been exfilteration of sensitive and secret data by a spy network
targeting government networks in India and other countries. The report
traced this complex ecosystem of cyber espionage to the Chengdu Province
of China. The shadow report revealed that in 31 countries, 139 IP
addresses of compromised computers were found, of which the highest 62
were from India.

Using the Right to Information we found
that no investigation has been launched by the Indian Government into
this cyber espionage (referring to the revelations made in the Shadow
Report), nor efforts made to close the security holes exploited by them.
For an attack on India that was no less serious than Kargil, this lapse
is shocking. Our conversation with various ministries of the government through RTIs is as follows:

Communication between Indian Government and Researchers: Indian cyber security officials were in Toronto to meet the researchers from Munk School of Global Affairs. As recently as early March, the Indian communications minister, Sachin Pilot, told reporters that government networks had been attacked by China, but that "not one attempt has been successful." On March 24, the Toronto researchers said, they contacted intelligence officials in India and told them of the spy ring they had been tracking. They requested and were given instructions on how to dispose of the classified and restricted documents.The IHQ, MOD (Army) vide letter no. A/810027/RTI/7356 dated 24 August 2011 informed that "liason with University of Toronto is carried out by National agencies and is beyond the charter of duties of IHQ of Mod (Army)."

Shadows in the cloud: An investigation into cyber espionage 2.0, www.infowar-http://www.infowar-monitor.net/2010/04/shadows-in-the-cloud-an-investigation-into-cyber-espionage-2-0/

India was aware of hacking threat, Times of India, 07-04-2010 http://articles.timesofindia.indiatimes.-com/2010-04-07/india/28130928_1_cyber-warfare-cyber-terrorism-national-security

Canadian researchers reveal online spy ring based in China, The Globe and Mail, 06 April 2010, http://www.theglobeandmail.com/news/technology/canadian-researchers-reveal-online-spy-ring-based-in-china/article1524228/